General
-
Target
SecuriteInfo.com.Exploit.Siggen3.17232.13262.6275
-
Size
33KB
-
Sample
220816-jlyxfshac6
-
MD5
7a115715d7ff051cdc0a008521e2c35e
-
SHA1
34e5ceddef13f16f6f5ee775c198b5cf76552b55
-
SHA256
d5d8cca33368d72e3d58ea71e3b4984f336d93b21af1c896141635961a0d777d
-
SHA512
821f80a21bef4999bfd9f1aa846d1b5649dbb96d4e0acf3004966eb7ba9f418412db0450dcc11c72cca4c8ce1d9c2b9ac0b33ce8083f3e814bc9c74d15ec670e
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Exploit.Siggen3.17232.13262.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Exploit.Siggen3.17232.13262.xls
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
SecuriteInfo.com.Exploit.Siggen3.17232.13262.6275
-
Size
33KB
-
MD5
7a115715d7ff051cdc0a008521e2c35e
-
SHA1
34e5ceddef13f16f6f5ee775c198b5cf76552b55
-
SHA256
d5d8cca33368d72e3d58ea71e3b4984f336d93b21af1c896141635961a0d777d
-
SHA512
821f80a21bef4999bfd9f1aa846d1b5649dbb96d4e0acf3004966eb7ba9f418412db0450dcc11c72cca4c8ce1d9c2b9ac0b33ce8083f3e814bc9c74d15ec670e
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-